Intel E6600 Specification Update - Page 53

Access Bit May be Set Prior to Signaling a Code Segment Limit

Page 53 highlights

Errata Implication: When this erratum occurs, the processor may live lock causing a system hang. Workaround: Do not perform unaligned accesses on paging structure entries. Status: For the steppings affected, see the Summary Tables of Changes. AI88. Problem: Microcode Updates Performed During VMX Non-root Operation Could Result in Unexpected Behavior When Intel® Virtualization Technology is enabled, microcode updates are allowed only during VMX root operations. Attempts to apply microcode updates while in VMX non-root operation should be silently ignored. Due to this erratum, the processor may allow microcode updates during VMX nonroot operations if not explicitly prevented by the host software. Implication: Microcode updates performed in non-root operation may result in unexpected system behavior. Workaround: Host software should intercept and prevent loads to IA32_BIOS_UPDT_TRIG MSR (79H) during VMX non-root operations. There are two mechanism that can be used (1) Enabling MSR access protection in the VM-execution controls or (2) Enabling selective MSR protection of IA32_BIOS_UPDT_TRIG MSR. Status: For the steppings affected, see the Summary Tables of Changes. AI89. INVLPG Operation for Large (2M/4M) Pages May be Incomplete under Certain Conditions Problem: The INVLPG instruction may not completely invalidate Translation Look-aside Buffer (TLB) entries for large pages (2M/4M) when both of the following conditions exist: • Address range of the page being invalidated spans several Memory Type Range Registers (MTRRs) with different memory types specified • INVLPG operation is preceded by a Page Assist Event (Page Fault (#PF) or an access that results in either A or D bits being set in a Page Table Entry (PTE)) Implication: Stale translations may remain valid in TLB after a PTE update resulting in unpredictable system behavior. Intel has not observed this erratum with any commercially available software. Workaround: Software should ensure that the memory type specified in the MTRRs is the same for the entire address range of the large page. Status: For the steppings affected, see the Summary Tables of Changes. AI90. Page Access Bit May be Set Prior to Signaling a Code Segment Limit Fault Problem: If code segment limit is set close to the end of a code page, then due to this erratum the memory page Access bit (A bit) may be set for the subsequent page prior to general protection fault on code segment limit. Intel® Core™2 Extreme Processor X6800 and Intel® Core™2 Duo Desktop Processor E6000 and E4000 Sequence 53 Specification Update

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71

Errata
Intel
®
Core™2 Extreme Processor X6800 and
Intel
®
Core™2 Duo Desktop Processor E6000 and E4000 Sequence
53
Specification Update
Implication:
When this erratum occurs, the processor may live lock causing a system
hang.
Workaround:
Do not perform unaligned accesses on paging structure entries.
Status:
For the steppings affected, see the Summary Tables of Changes.
AI88.
Microcode Updates Performed During VMX Non-root Operation Could
Result in Unexpected Behavior
Problem:
When Intel
®
Virtualization Technology is enabled, microcode updates are
allowed only during VMX root operations. Attempts to apply microcode
updates while in VMX non-root operation should be silently ignored. Due to
this erratum, the processor may allow microcode updates during VMX non-
root operations if not explicitly prevented by the host software.
Implication:
Microcode updates performed in non-root operation may result in unexpected
system behavior.
Workaround:
Host software should intercept and prevent loads to IA32_BIOS_UPDT_TRIG
MSR (79H) during VMX non-root operations. There are two mechanism that
can be used (1) Enabling MSR access protection in the VM-execution controls
or (2) Enabling selective MSR protection of IA32_BIOS_UPDT_TRIG MSR.
Status:
For the steppings affected, see the Summary Tables of Changes.
AI89.
INVLPG Operation for Large (2M/4M) Pages May be Incomplete
under Certain Conditions
Problem:
The INVLPG instruction may not completely invalidate Translation Look-aside
Buffer (TLB) entries for large pages (2M/4M) when both of the following
conditions exist:
Address range of the page being invalidated spans several Memory Type Range
Registers (MTRRs) with different memory types specified
INVLPG operation is preceded by a Page Assist Event (Page Fault (#PF) or an
access that results in either A or D bits being set in a Page Table Entry (PTE))
Implication:
Stale translations may remain valid in TLB after a PTE update resulting in
unpredictable system behavior.
Intel has not observed this erratum with any
commercially available software.
Workaround:
Software should ensure that the memory type specified in the MTRRs is the
same for the entire address range of the large page.
Status:
For the steppings affected, see the Summary Tables of Changes.
AI90.
Page Access Bit May be Set Prior to Signaling a Code Segment Limit
Fault
Problem:
If code segment limit is set close to the end of a code page, then due to this
erratum the memory page Access bit (A bit) may be set for the subsequent
page prior to general protection fault on code segment limit.